|
[1] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Trans. Image Process, Vol.6. No.12, pp. 1673-1678,1997. [2] D. Chaum, Security without Identification, Transaction Systems to Make Big Brother Obsolete, Communications of the ACM, v.28, n.10, pp. 1030-1044,1985. [3] M. Yeung, and F. Mintzer, "An Invisible Watermarking Technique for Image Verification." In Proceeding of International Conference on Image Processing (ICIP), Santa Barbara, Calif., 1997. [4] Nasir Memon, and Ping Wah Wong, "Protecting Digital Media Content", Communications of the ACM, Vol. 41. No. 7, pp. 35-43, July. 1998. [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A Digital Watermark", IEEE ICIP94, vol. 2, 1994. [6] N. Nikolaidis and I. Pitas, "Copyright Protection of Images Using Robust Digital Images", IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Vol. 4, May 1996. [7] R. Wolfgang and E. Delp, "A Watermark for Digital Images", IEEE ICIP96, Vol. 3, September 1996. [8] I. Pitas, "A Method for Signature Casting on Digital Images", IEEE ICIP96, Vol. 3, September 1996. [9] Xiang-gen Xia, Charles G. Boncelet, and Gonzalo R. Arce, "A Multiresolution Watermark for Digital Images", IEEE ICIP97, Vol. 1, June 1997. [10] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang, "Multiresolution Watermarking for Images and Video:a Unified Approach", IEEE ICIP98, Vol. 1, October 1998. [11] R. Dugad, K. Ratakonda, and N. Ahuja, "A New Wavelet -Based Scheme for Watermarking Images", IEEE ICIP98, Vol. 2, October 1998. [12] Chiuo-Ting Hsu, and Ja-Ling Wu, "Hidden Digital Watermarks in Images", IEEE Transactions on Image Processing, Vol. 8, January 1999. [13] G. Voyatzis and I. Pitas, " Applications of Toral Automorphisms in Image Watermarking", IEEE ICIP96, Vol. 2, pp. 237-240, September 1996. [14] 張真誠、鍾珮芳, "資訊教學心得與研究報告-數位浮水印", 資訊與教育雜誌第70期。 [15] E. Koch and J. Zhao, " Towards robust and hidden image copyright labeling", Nonlinear Signal Processing Workshop, Thessaloniki, Greece. 1995. [16] C. Podilchuk, and W. Zeng, "Perceptual watermarking of still images", IEEE Workshop on Multimedia Signal Processing, pp. 363-368, June 1997, Princeton. [17] D. Kunder and D. Hatzinakos, " A robust digital image watermarking method using wavelet-based fusion", IEEE ICIP97, Vol. I, pp. 544-547, Santa Barbara, CA, 1997. [18] M. Swanson, B. Zhu, B. Chau, and A. Tewfik, "Object-based transparent video watermarks", IEEE Workshop on Multimedia Signal Processing, pp.369-374, June 1997, Princeton. [19] M. Swanson, B. Zhu, B. Chau, and A. Tewfik, "Multi-resolution video watermarking using perceptual models and scene segmentation", IEEE ICIP97, Vol. II, pp. 1151-1154, Santa Barbara, CA, 1997. [20] Hisashi INOUE, Akio MIYAZAKI, Akihiro YAMAMOTO, and Takashi KATSURA, " A digital watermark based on the wavelet transform and its robustness on image compression", IEEE ICIP98, Vol. 2, October 1998. [21] Leihua Xie, and Gonzalo R. Arce, " Joint Wavelet Compression and Authentication Watermarking", IEEE ICIP98, Vol. 2, October 1998. [22] G. Voyatzis, amd I. Pitas, "Chaotic watermarks for embedding in the spatial digital image domain", IEEE ICIP98, Vol. 2, October 1998. [23] D. Gruhl. (1996) Examples of affine embedding. [Online]. Available WWW: http://nif.www.media.mit.edu/Datahiding/affine/affine.html [24] S. Walton, "Image authentication for a slippery new age", Dr. Dobb''s J., pp.18-26 and 82-87, April 1995. [25] R. Van Schyndel, A. Tirkel, and C. Osborne, " A digital watermark", in Proceeding of ICASSP. Piscataway, NJ: IEEE Press, 1994, vol. II, pp.86-90. [26] Paint Shop Pro version 5.00, copyright 1991-1998, Jasc Software, Inc.
|